Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

Journal

Privacy

Institution
Publication Year
Publication

Articles 1 - 29 of 29

Full-Text Articles in Entire DC Network

A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan Apr 2023

A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan

Northwestern Journal of Technology and Intellectual Property

No abstract provided.


Standing Up To Hackers: Article Iii Standing For Victims Of Data Breaches, Kendall Coffey Feb 2023

Standing Up To Hackers: Article Iii Standing For Victims Of Data Breaches, Kendall Coffey

University of Miami Law Review

Despite the increasing amount of data breaches, there is no liability for parties who do not adequately protect victim’s information. In federal court, plaintiffs must show that their injury was concrete, particularized, and imminent. But, when plaintiffs’ information has been stolen, but not yet criminally used, they may be unable to establish a right to relief. Victims face challenges when seeking damage for this future harm, because despite their destroyed privacy, they may not have evidence of a perpetrator’s actual misuse of purloined data. This Article analyzes multiple court decisions, generally in the setting of class-actions, and discusses outcomes of …


The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant Jan 2023

The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant

American University National Security Law Brief

Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …


The Development Of Digital Mass Surveillance In Norway: The Emergence Of A Surveillance State?, Iris Nguyên Duy Jan 2023

The Development Of Digital Mass Surveillance In Norway: The Emergence Of A Surveillance State?, Iris Nguyên Duy

FIU Law Review

No abstract provided.


Flattening The Curve While Protecting Our Right To Privacy: How The United States Can Implement The Digital Contract Tracing Efforts Used In East Asia, Evan Morris Aug 2022

Flattening The Curve While Protecting Our Right To Privacy: How The United States Can Implement The Digital Contract Tracing Efforts Used In East Asia, Evan Morris

Global Business Law Review

This paper looks at the digital contact tracing efforts implemented by other nations and assesses how similar measures could operate under enacted and proposed United States laws. Part I overviews the history of contact tracing and its effectiveness in prior disease outbreaks. Part II delves into the digital contact tracing efforts implemented by South Korea and Singapore. These summaries include: the digital contact tracing efforts taken, the laws that authorize these efforts, the public’s reception, and the overall effectiveness of the efforts. Part III overviews the digital contact tracing efforts in the United States, including proposed legislation aimed at user …


Privacy Frameworks For Smart Cities, Lindsey Tonsager, Jayne Ponder Jan 2022

Privacy Frameworks For Smart Cities, Lindsey Tonsager, Jayne Ponder

Journal of Law and Mobility

This paper identifies some of the core privacy considerations raised by smart cities – government surveillance and data security in Part I. Then, Part II proposes a set of core principles for smart cities to consider in the development and deployment of smart cities to address privacy concerns. These principles include: (A) human-centric approaches to smart cities design and implementation, (B) transparency for city residents, (C) privacy by design, (D) anonymization and deidentification, (E) data minimization and purpose specification, (F) trusted data sharing, and (G) cybersecurity resilience.


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski Jan 2022

Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski

Catholic University Journal of Law and Technology

No abstract provided.


Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell Oct 2021

Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell

St. Mary's Law Journal

Abstract forthcoming.


Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips Aug 2020

Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips

Journal of Digital Forensics, Security and Law

Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the …


Modern Privacy Advocacy: An Approach At War With Privacy Itself?, Justin "Gus" Hurwitz, Jamil N. Jaffer Jun 2020

Modern Privacy Advocacy: An Approach At War With Privacy Itself?, Justin "Gus" Hurwitz, Jamil N. Jaffer

Pepperdine Law Review

This Article argues that the modern concept of privacy itself, particularly as framed by some of its most ardent advocates today, is fundamentally incoherent. The Article highlights that many common arguments made in support of privacy, while initially seeming to protect this critical value, nonetheless undermine it in the long run. Using both recent and older examples of applying classic privacy advocacy positions to key technological innovations, the authors demonstrate how these positions, while seemingly privacy-enhancing at the time, actually resulted in outcomes that were less beneficial for consumers and citizens, including from a purely privacy-focused perspective. As a result, …


The Law Of The Tetrapods, Henry T. Greely Jan 2020

The Law Of The Tetrapods, Henry T. Greely

Vanderbilt Journal of Entertainment & Technology Law

Should there be such a thing as "Technology Law"? This Article explores that question in two ways. It first looks at four substantive issues that appear across many different areas of technology law: privacy, security, property, and responsibility. It then examines five questions that frequently recur about how to regulate very different new technologies. These questions include which agency should regulate, whether regulation should focus on before or after marketing, what jurisdiction should regulate, how relevant new information will be gained and used, and how-politically-good regulation can be enacted. This Article concludes that it may make sense to develop a …


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart Jan 2019

The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart

Catholic University Journal of Law and Technology

This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (Apple) and the Department of Justice (DOJ) concerning the DOJ’s use of the All Writs Act[1] (AWA) to require Apple to provide technical assistance to the DOJ so that it could access the encrypted data from the locked iPhone of Syed Rizwan Farook, commonly referred to as the San Bernardino shooter. The DOJ’s initial ex parte application focused on meeting the requirements of United States v. New York Telephone Co.[2] concluding the court order was authorized and appropriate. Apple not only argued …


Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat Jan 2018

Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat

Catholic University Journal of Law and Technology

Smart baby monitors exist to help parents protect and watch over their children. The smart baby monitors act as a second set of eyes when parents cannot be in the same room as their children. Low-tech hackers take advantage of gaps in the security of smart baby monitors. A hacker violates a consumer’s privacy by gaining access to private information, viewing the home and its occupants, and even speaking to children through the monitor.

This comment advocates for stricter security legislation for smart baby monitors. Without new legislation, manufacturers of smart baby monitors do not apply or invest in the …


Privacy And Outrage, Jordan M. Blanke Jan 2018

Privacy And Outrage, Jordan M. Blanke

Journal of Law, Technology, & the Internet

It is not an understatement that technology has dramatically altered virtually every aspect of our life in recent years. While technology has always driven change, these changes are occurring more rapidly and more extensively than ever before. We are fully entrenched in the world of Big Data, the Internet of Things, and Smart Cities – and we are never going back. As always, society and its laws must evolve, but it is not always an easy process.

The notion of privacy has certainly changed in our data-driven world and continues to change daily. While it has always been difficult to …


Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy Jan 2018

Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy

Catholic University Journal of Law and Technology

In modern society, cell phones have become a virtual extension of most Americans. Advances in cell phone technology have given rise to the popularity of mobile dating applications (“apps”), which are capable of allowing users to date and meet potential partners without leaving the comfort of their own homes. The convenience and allure of mobile dating apps has led to a staggering increase in the number of crimes orchestrated against other users of the apps. Such crimes often include solicitation, stalking, murder, and human trafficking. Unsuspecting and trusting users fall victim to these crimes due to the false sense of …


The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson Aug 2017

The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson

Oklahoma Journal of Law and Technology

No abstract provided.


Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram Jun 2016

Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram

Canadian Journal of Law and Technology

Dr. Smyth’s book is ambitious in its scope, seeking to trace the criminology and evolution of information technologies and cybercrime as the basis of current Canadian legislation and jurisprudence. It is intended as a concise student reference text or resource for those who are new to the subject area, studying in criminology and other areas, as opposed to law. A list of concepts and issues for discussion appears at the conclusion of each chapter and there is a glossary of technical (but not legal) terms at the end of the book. It takes a neutral and professorial approach, seeking to …


The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley Jan 2016

The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley

Brooklyn Journal of International Law

In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …


Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao Dec 2015

Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao

Catholic University Journal of Law and Technology

No abstract provided.


Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner Jul 2015

Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner

Seattle University Law Review

This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to their …


Enhancing The Teaching Of Lawyering Skills And Perspectives Through Virtual World Engagement, Andrea M. Seielstad Mar 2014

Enhancing The Teaching Of Lawyering Skills And Perspectives Through Virtual World Engagement, Andrea M. Seielstad

University of Massachusetts Law Review

Educators from around the globe are rapidly utilizing and transforming virtual worlds, such as Second Life, with innovative teaching strategies. Mediation and dispute resolution, and associated communication and problem-solving skills, are particularly well suited for developing in virtual worlds, as are other lawyering skills such as, interviewing, counseling, and trial advocacy. The opportunities for students and faculty to engage in cross-cultural exchange and networking are another selling feature of virtual world engagement. Virtual worlds offer particular promise for those seeking innovative and cost-effective ways to integrate more professional training and skills development into the law school curriculum. Moreover, as more …


Identity Theft On Social Networking Sites: Developing Issues Of Internet Impersonation, Maksim Reznik Oct 2013

Identity Theft On Social Networking Sites: Developing Issues Of Internet Impersonation, Maksim Reznik

Touro Law Review

This Comment focuses on the dangers of social media sites when a person gains access to another's online account through two different methods: (1) stealing the third party's password, or (2) creating a completely fake profile and subsequently impersonating that person.


Facilitando The Cloud: Data Protection Regulation As A Driver Of National Competitiveness In Latin America, Horacio Gutiérrez, Daniel Korn Oct 2013

Facilitando The Cloud: Data Protection Regulation As A Driver Of National Competitiveness In Latin America, Horacio Gutiérrez, Daniel Korn

University of Miami Inter-American Law Review

No abstract provided.


Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett Jan 2013

Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett

Michigan Telecommunications & Technology Law Review

A number of methods currently exist or are being developed to determine where Internet users are located geographically when they access a particular webpage. Yet regardless of the precautions taken by website operators to limit the locations from which they allow access, it is likely that users will find ways to gain access to restricted content. Should the evasion of geolocation constitute circumvention of access controls so that § 1201 of the Digital Millennium Copyright Act ("DMCA") applies? Because location data can properly be considered personally identifiable information ("PII"), this Note argues that § 1201 should not apply absent a …


Privacy Implications Of Smart Meters, Cheryl Dancey Balough Dec 2010

Privacy Implications Of Smart Meters, Cheryl Dancey Balough

Chicago-Kent Law Review

Many people worry about the erosion of privacy in our society given developments in technology, but that loss of privacy may take a quantum leap as electric "smart meters" make it possible for strangers to know on a real-time basis what is occurring in our houses and apartments. Perhaps the greatest concern is that current laws and regulations do not fully protect us from this unprecedented threat to two of our most basic rights—to be left alone in our own homes and to control personal information. Utility companies across the country are replacing conventional electric meters with smart meters designed …


Privacy Concerns Regarding The Monitoring Of Instant Messaging In The Workplace: Is It Big Brother Or Just Business?, Ira David Sep 2004

Privacy Concerns Regarding The Monitoring Of Instant Messaging In The Workplace: Is It Big Brother Or Just Business?, Ira David

Nevada Law Journal

No abstract provided.


The Emergence Of Website Privacy Norms, Steven A. Hetcher Jun 2001

The Emergence Of Website Privacy Norms, Steven A. Hetcher

Michigan Telecommunications & Technology Law Review

Part I of the Article will first look at the original privacy norms that emerged at the Web's inception in the early 1990s. Two groups have been the main contributors to the emergence of these norms; the thousands of commercial websites on the early Web, on the one hand, and the millions of users of the early Web, on the other hand. The main structural feature of these norms was that websites benefitted through the largely unrestricted collection of personal data while consumers suffered injury due to the degradation of their personal privacy from this data collection. In other words, …